http://leteckaposta.cz/254024873--- Doplnění předchozího příspěvku (18 Úno 2014 12:48) ---
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\021814-5250-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is:
http://msdl.microsoft.com/download/symbolsExecutable search path is:
Windows 7 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff801`5f68b000 PsLoadedModuleList = 0xfffff801`5f94f990
Debug session time: Tue Feb 18 01:10:38.607 2014 (GMT+1)
System Uptime: 0 days 6:07:10.295
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffc000112901d8, 2, 1, fffff8015f77410e}
Probably caused by : memory_corruption ( nt!MiReadyStandbyPageForActive+15a )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc000112901d8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015f77410e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffff8015f93d340: Unable to get special pool info
fffff8015f93d340: Unable to get special pool info
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
ffffc000112901d8
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReadyStandbyPageForActive+15a
fffff801`5f77410e 498903 mov qword ptr [r11],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: uTorrent.exe
LAST_CONTROL_TRANSFER: from fffff8015f7e47e9 to fffff8015f7d8ca0
STACK_TEXT:
ffffd000`23a98f08 fffff801`5f7e47e9 : 00000000`0000000a ffffc000`112901d8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23a98f10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+15a
fffff801`5f77410e 498903 mov qword ptr [r11],rax
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+15a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReadyStandbyPageForActive+15a
BUCKET_ID: X64_0xA_nt!MiReadyStandbyPageForActive+15a
Followup: MachineOwner
---------
--- Doplnění předchozího příspěvku (18 Úno 2014 15:11) ---
A znovu teď
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\021814-5125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is:
http://msdl.microsoft.com/download/symbolsExecutable search path is:
Windows 7 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff802`a2476000 PsLoadedModuleList = 0xfffff802`a273a990
Debug session time: Tue Feb 18 15:06:21.615 2014 (GMT+1)
System Uptime: 0 days 0:31:50.304
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffc0000bcdb020, 2, 1, fffff802a255f10e}
Probably caused by : memory_corruption ( nt!MiReadyStandbyPageForActive+15a )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc0000bcdb020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802a255f10e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffff802a2728340: Unable to get special pool info
fffff802a2728340: Unable to get special pool info
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
ffffc0000bcdb020
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReadyStandbyPageForActive+15a
fffff802`a255f10e 498903 mov qword ptr [r11],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: uTorrent.exe
LAST_CONTROL_TRANSFER: from fffff802a25cf7e9 to fffff802a25c3ca0
STACK_TEXT:
ffffd000`24af4f48 fffff802`a25cf7e9 : 00000000`0000000a ffffc000`0bcdb020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`24af4f50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+15a
fffff802`a255f10e 498903 mov qword ptr [r11],rax
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+15a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReadyStandbyPageForActive+15a
BUCKET_ID: X64_0xA_nt!MiReadyStandbyPageForActive+15a
Followup: MachineOwner
---------
3: kd> lmvm nt
start end module name
fffff802`a2476000 fffff802`a2bf7000 nt (pdb symbols) C:\Program Files (x86)\Debugging Tools for Windows (x86)\sym\ntkrnlmp.pdb\A32C55CDEBC1441DAC80552A86F5F11F1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\Program Files (x86)\Debugging Tools for Windows (x86)\sym\ntoskrnl.exe\52718D9C781000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Wed Oct 30 23:52:12 2013 (52718D9C)
CheckSum: 007120D6
ImageSize: 00781000
File version: 6.3.9600.16452
Product version: 6.3.9600.16452
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.3.9600.16452
FileVersion: 6.3.9600.16452 (winblue_gdr.131030-1505)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.